Category: Security

What is a SOC Security Operations Center at a COUPLE of GURUS

What is a Security Operations Center (SOC)

A Security Operations Center is sometimes abbreviated as SOC and pronounced as “sock.” It is a centralized unit that deals with security issues on an organization and technical level. SOC comprises three main components, including people, processes, and technology. Its primary purpose is to ensure that an organization is protected ...
SIEM and SOC at a COUPLE of GURUS

SIEM and SOC

This month we would like to take some time and highlight our advanced security services, SIEM (Security Information and Event Monitoring) and SOC (Security Operation Center). As time progresses, more economic sectors and industries will have to adhere to regulatory compliance geared towards protecting data.  PCI-DSS, HIPAA, and CMMC are ...
7 Types of Cyber Security Threats - A Blog image from a COUPLE of GURUS

7 Types of Cyber Security Threats

Did you know that cybercrime is now the number one global threat to businesses? Cybersecurity Ventures forecasts that cybercrime “will cost the world $10.5 trillion annually by 2025.” That's more than the total GDP of France, Italy, or Brazil, and the 3rd world largest after the US and China! So, ...
Phishing Attacks and What to Know

Phishing Attacks – What to Know

Phishing attacks are on the rise and can result in company breaches if not identified properly by users.  The best way to prevent a phishing attack is to know how to identify a potential attack.  We have some telltale ways to identify if an email may be phishing. 6 Ways ...

Small business data breach response checklist

Not all data breaches are sensational, highly-publicized events. In fact, smaller and lower profile companies are frequently targeted by hackers due to their less robust cybersecurity defenses. And breaches are not always caused by cyber attacks: They can be inadvertently caused by careless or poorly trained employees. Regardless of the ...

My IT guy quit, now what?

Receiving a resignation letter from your IT manager can set off the panic alarm – and for good reason. Most organizations rely heavily on their IT people to keep their business secure and operational, and picking up where they left off isn’t easy – especially if you don’t gather the ...

What is a CMMC audit and how to prepare for one

The Cybersecurity Maturity Model Certification (CMMC) is replacing the previous cybersecurity self-assessment process known as DFARS (Defense Federal Acquisition Regulations System), which made businesses contracted to work with the Department of Defense (DoD) responsible for their own compliance. CMMC certification is achieved through external auditing, and failing will result in ...

The Quick Guide to BYOD Security

Bring Your Own Device (BYOD) is a trend that’s growing rapidly across a variety of industries. Learn how BYOD can benefit your business and what you need to do to mitigate the risks and challenges to make it as safe and secure as possible. BYOD: Bring Your Own Device Allowing ...

What is CMMC and Who Needs To Comply?

In late 2020, the US Department of Defense announced a transition to a new certification program for all contractors working with Controlled Unclassified Information (CUI). Compliance is mandatory for all manufacturers and will require an assessment from a CMMC third-party assessment organization (C3PAO). The good news is the new certification ...

How to Use an S2Score to Measure Your Organization’s Security Risk and Build Proof of Compliance

With rising cybercrime rates and increasingly advanced cybercriminals and foreign intelligence, cybersecurity is more important than ever. Your competitors and clients know this, which is why it’s no longer enough to claim your business is proficient in cybersecurity – you need to show proof to back it up. An S2Score (previously ...